Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2006

AUTHORS

Tal Moran , Moni Naor

ABSTRACT

We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll results. The protocols use simple physical objects (envelopes or scratch-off cards) and can be performed without the aid of computers. One of the main innovations of this work is the use of techniques from theoretical cryptography to rigorously prove the security of a realistic, physical protocol. We show that, given a few properties of physical envelopes, the protocols are unconditionally secure in the universal composability framework. More... »

PAGES

88-108

Book

TITLE

Advances in Cryptology - EUROCRYPT 2006

ISBN

978-3-540-34546-6
978-3-540-34547-3

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/11761679_7

DOI

http://dx.doi.org/10.1007/11761679_7

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1019270268


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel", 
          "id": "http://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Moran", 
        "givenName": "Tal", 
        "id": "sg:person.012022173111.00", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel", 
          "id": "http://www.grid.ac/institutes/grid.13992.30", 
          "name": [
            "Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Naor", 
        "givenName": "Moni", 
        "id": "sg:person.07776170271.83", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2006", 
    "datePublishedReg": "2006-01-01", 
    "description": "We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll results. The protocols use simple physical objects (envelopes or scratch-off cards) and can be performed without the aid of computers. One of the main innovations of this work is the use of techniques from theoretical cryptography to rigorously prove the security of a realistic, physical protocol. We show that, given a few properties of physical envelopes, the protocols are unconditionally secure in the universal composability framework.", 
    "editor": [
      {
        "familyName": "Vaudenay", 
        "givenName": "Serge", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/11761679_7", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-540-34546-6", 
        "978-3-540-34547-3"
      ], 
      "name": "Advances in Cryptology - EUROCRYPT 2006", 
      "type": "Book"
    }, 
    "keywords": [
      "universal composability framework", 
      "simple physical objects", 
      "theoretical cryptography", 
      "physical objects", 
      "aid of computers", 
      "physical protocols", 
      "physical envelope", 
      "realistic protocols", 
      "main innovation", 
      "use of techniques", 
      "protocol", 
      "cryptography", 
      "rigorous analysis", 
      "accurate statistical analysis", 
      "computer", 
      "security", 
      "same time", 
      "polling", 
      "objects", 
      "framework", 
      "technique", 
      "work", 
      "innovation", 
      "aid", 
      "time", 
      "use", 
      "statistical analysis", 
      "analysis", 
      "results", 
      "envelope", 
      "poll results", 
      "properties", 
      "responders", 
      "response", 
      "composability framework", 
      "Human-Centric Protocol"
    ], 
    "name": "Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol", 
    "pagination": "88-108", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1019270268"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/11761679_7"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/11761679_7", 
      "https://app.dimensions.ai/details/publication/pub.1019270268"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-01-01T19:20", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/chapter/chapter_358.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/11761679_7"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/11761679_7'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/11761679_7'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/11761679_7'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/11761679_7'


 

This table displays all metadata directly associated to this object as RDF triples.

103 TRIPLES      23 PREDICATES      62 URIs      55 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/11761679_7 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N186d6eaac921486fb557591b1917b317
4 schema:datePublished 2006
5 schema:datePublishedReg 2006-01-01
6 schema:description We propose simple, realistic protocols for polling that allow the responder to plausibly repudiate his response, while at the same time allow accurate statistical analysis of poll results. The protocols use simple physical objects (envelopes or scratch-off cards) and can be performed without the aid of computers. One of the main innovations of this work is the use of techniques from theoretical cryptography to rigorously prove the security of a realistic, physical protocol. We show that, given a few properties of physical envelopes, the protocols are unconditionally secure in the universal composability framework.
7 schema:editor Nd671014dcd724b36a2a4a5cc0819a656
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf N767cfc0fbfff4e778cee5c9d7c53c104
12 schema:keywords Human-Centric Protocol
13 accurate statistical analysis
14 aid
15 aid of computers
16 analysis
17 composability framework
18 computer
19 cryptography
20 envelope
21 framework
22 innovation
23 main innovation
24 objects
25 physical envelope
26 physical objects
27 physical protocols
28 poll results
29 polling
30 properties
31 protocol
32 realistic protocols
33 responders
34 response
35 results
36 rigorous analysis
37 same time
38 security
39 simple physical objects
40 statistical analysis
41 technique
42 theoretical cryptography
43 time
44 universal composability framework
45 use
46 use of techniques
47 work
48 schema:name Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol
49 schema:pagination 88-108
50 schema:productId N6e60afd6a4924a8b8f468f3f27103948
51 Nbde635657b314aad97a7cb8be973f177
52 schema:publisher Nde14fa8497244ccfb707a8fa88faa8ff
53 schema:sameAs https://app.dimensions.ai/details/publication/pub.1019270268
54 https://doi.org/10.1007/11761679_7
55 schema:sdDatePublished 2022-01-01T19:20
56 schema:sdLicense https://scigraph.springernature.com/explorer/license/
57 schema:sdPublisher N47180ee405f9418aa5e55152fb2bc408
58 schema:url https://doi.org/10.1007/11761679_7
59 sgo:license sg:explorer/license/
60 sgo:sdDataset chapters
61 rdf:type schema:Chapter
62 N18258ec476dc4af693c6605c8753ad0b schema:familyName Vaudenay
63 schema:givenName Serge
64 rdf:type schema:Person
65 N186d6eaac921486fb557591b1917b317 rdf:first sg:person.012022173111.00
66 rdf:rest Neae705a1832948e399baa18b94e62a42
67 N47180ee405f9418aa5e55152fb2bc408 schema:name Springer Nature - SN SciGraph project
68 rdf:type schema:Organization
69 N6e60afd6a4924a8b8f468f3f27103948 schema:name doi
70 schema:value 10.1007/11761679_7
71 rdf:type schema:PropertyValue
72 N767cfc0fbfff4e778cee5c9d7c53c104 schema:isbn 978-3-540-34546-6
73 978-3-540-34547-3
74 schema:name Advances in Cryptology - EUROCRYPT 2006
75 rdf:type schema:Book
76 Nbde635657b314aad97a7cb8be973f177 schema:name dimensions_id
77 schema:value pub.1019270268
78 rdf:type schema:PropertyValue
79 Nd671014dcd724b36a2a4a5cc0819a656 rdf:first N18258ec476dc4af693c6605c8753ad0b
80 rdf:rest rdf:nil
81 Nde14fa8497244ccfb707a8fa88faa8ff schema:name Springer Nature
82 rdf:type schema:Organisation
83 Neae705a1832948e399baa18b94e62a42 rdf:first sg:person.07776170271.83
84 rdf:rest rdf:nil
85 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
86 schema:name Information and Computing Sciences
87 rdf:type schema:DefinedTerm
88 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
89 schema:name Data Format
90 rdf:type schema:DefinedTerm
91 sg:person.012022173111.00 schema:affiliation grid-institutes:grid.13992.30
92 schema:familyName Moran
93 schema:givenName Tal
94 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012022173111.00
95 rdf:type schema:Person
96 sg:person.07776170271.83 schema:affiliation grid-institutes:grid.13992.30
97 schema:familyName Naor
98 schema:givenName Moni
99 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07776170271.83
100 rdf:type schema:Person
101 grid-institutes:grid.13992.30 schema:alternateName Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
102 schema:name Department of Computer Science and Applied Mathematics, Weizmann Institute of Science, Rehovot, Israel
103 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...